All Products
Search
Document Center

Cloud Architect Design Tools:CADT custom policies

Last Updated:Mar 12, 2026

If the system policies do not meet your requirements, you can create custom policies for fine-grained permission management.

Prerequisites

Before you create a custom policy, you must be familiar with the basic structure and syntax of the access policy language. For more information, see Access policy structure and syntax.

Introduction to CADT custom policies

Cloud Architect Design Tools (CADT) provides three common custom policy templates that you can configure based on your requirements:

Custom policy

Description

Sample configuration file

Read-only permission

Permission to manage CADT in read-only mode

Read-only permission configuration file

Import permission

Permission to discover and import resources in CADT

Import permission configuration file

Management permission

Permission to manage CADT

Management permission configuration file

Note

The sample files include permissions for only some products. You can configure the permissions as needed.

Examples

Create a RAM user

  1. Log on to the Resource Access Management (RAM) console.

  2. Create a test user named `cadt-user`. For more information, see Create a RAM user.Image 2

Create a CADT custom policy

  1. Create a custom policy that grants read-only permission.1

  2. On the Create Policy page, select Script Editor. Copy the content of the read-only permission script into the editor, and then click Continue to edit basic information.

    Note

    The script includes read-only permissions for some cloud products. You can modify the script as needed.

    image

  3. Set the policy name. In this example, set the name to `cadt-read-only`. Then, click OK.image

  4. Similarly, create custom policies that grant import permission (named `cadt-import`) and management permission (named `cadt-deploy`).Image 4

Permission validation

Validate read-only permission

The read-only permission grants read-only access to CADT applications and Alibaba Cloud resources. For example, you can view applications and architecture graphs in CADT. You can also view information such as Elastic Compute Service (ECS) IP addresses, hostnames, and ApsaraDB RDS database addresses. This permission is useful for daily development and testing.

  1. For testing purposes, use your Alibaba Cloud account to deploy a simple application in CADT that consists of an ECS instance and an elastic IP address (EIP). Name the application `cadt-test`.image

  2. Click the cadt-read-only tag to add the read-only permission.Image 5

  3. On the Overview page, note the logon URL and log on as `cadt-user`.Image 6Image 7

  4. On the My Applications page of the CADT console, you can view the `cadt-test` application that was created by the Alibaba Cloud account, and all other applications.image

  5. View the details of a resource, such as an ECS instance:imageimage

  6. You can create new applications, design architectures, and configure parameters. However, you do not have permission to save or deploy applications.image

Validate import permission

The import permission lets you discover resources on Alibaba Cloud, create architecture graphs, and create applications. In CADT, you can also create applications, configure resources, import existing resources, validate resources, estimate costs, and view reports. This permission does not grant permission to deploy resources.

  1. Use your Alibaba Cloud account to revoke the read-only permission from the RAM user `cadt-user` and grant the import permission (`cadt-import`).Image 19

  2. The permissions in CADT are as follows:

    1. Permission to discover resources:imageimage

    2. Permission to create applications, configure parameters, and save applications:image

    3. Permission to validate resources:image

    4. Permission to estimate costs and view reports:image

    5. No permission to deploy resources:image

    6. Permission to import existing resources:image

Validate management permission

The management permission includes all import permissions, plus the permission to deploy resources. To prevent accidental operations and reduce risks, the one-click release feature is disabled. For daily O&M tasks, you can delete resources individually from the architecture graph.

  1. Use your Alibaba Cloud account to revoke other permissions from the RAM user `cadt-user` and grant the management permission (`cadt-deploy`).Image 30

  2. In addition to all import permissions, this permission also grants the permission to deploy resources.imageimage

  3. You do not have permission to release all resources with one click.image

  4. You have the permission to delete resources individually from the architecture graph.

    imageimageAfter you flag a resource for deletion, save and deploy the application. Follow the prompts to release the resource:imageimage